Uploaded on Jun 3, 2020
PPT on Important steps to be taken to secure your data.
Important steps to be taken to secure your data.
Important Steps to be Taken to Secure
Your Data
1. Watch out What you Allow
• When you install an application, it may ask to fetch some of your data, So
allow the non-confidential information only.
• If the application is asking for phone data or banking data then you must
be aware what you’re signing for.
Source: Google Images
2. Read the Agreement
• One of the common mistake people do, is they just click next and
do not read the whole agreement document. But this is necessary
to go through the document before you opt for.
Source: Google Images
3. Don’t let others use your account
• Your client account speaks to all the figuring assets that you actually have
been approved to get to.
• By letting another person utilize your client account, you are letting them
get to assets for which they might not have endorsement. Anything that
they may do will, at last, be your duty.
Source: Google Images
4. Use Network Drives
• All records that contain touchy data, or that are basic to the University's
work ought to be put away on a system drive – however just as long as
they are required.
• These are generally the drives with higher letters in the letters in order
above "F:\".
Source: Google Images
5. Check for Security Updates
• This is a good practice to check for security updates regularly, because
when the application has some issues, they generally provide the security
patches.
• Those are the must have things for anyone.
Source: Google Images
6. Data Encryption
• Information encryption isn't only for innovation nerds; present day
instruments make it feasible for anybody to encode messages and other
data.
• GPG for Mail, for instance, is an open source module for the Apple Mail
program that makes it simple to encode, decode, sign and check messages
utilizing the OpenPGP standard.
Source: Google Images
7. Security Protocol
• You ought to consistently utilize encryption to see sites containing delicate
information. You can tell if a site is utilizing encryption if the web address
starts with "https".
• In the event that you have made a site that gathers touchy information,
you ought to be certain that the site powers clients to utilize encryption
while submitting information and that the information, once submitted, is
being put away safely.
Source: Google Images
8. OS Update
• Operating System updates are a monstrous torment for clients; it's the
legitimate truth. Be that as it may, they're a fundamental malice, as these
updates contain basic security fixes that will shield your PC from as of late
found dangers.
• Neglecting to introduce these updates implies your PC is in danger.
Source: Google Images
9. Do not open Email attachments
You are not aware of
• Be dubious of messages with connections that you were not hoping to get,
regardless of whether they have all the earmarks of being from somebody
you know.
• In the event that it seems, by all accounts, to be from somebody you know,
before you open it, get in touch with them and affirm that they planned to
send you the connection.
Source: Google Images
10. Use Antivirus
• The vast majority of us have a week after week staff meeting. At these
occasions your PC is typically sitting inert in your office. That is an ideal
chance to plan an antivirus output of your PC to run.
• These can run while your PC is bolted. On the off chance that any infections
are distinguished, if it's not too much trouble report them to the HelpDesk.
Source: Google Images
Comments